. >> did you really dress trixie as tiger? hey, i saw this pic of trixie? >> no. >> it is my dog. that is my first reaction, oh, my gosh, hoda knows my dog. that's how it popped up on my screen. >> is very easy to do. >> so you sign like that all the time. >> i sign like that. >> so there's two problems here, the first problem is if you look at it if you clicked on your name from the sender, hoda, really isn't you, see the 9 at the end? we blocked out the e-mail address. >> i can't see what it says. >> okay this is a made up -- this is a made up e-mail, not your e-mail. but it showed up in her e-mail box, just says hoda. that's why that was number one. >> of course you would react. then what happened? >> so all firning scams have three components. one, comes from a trusted source, apparent trufsed source like hoda. the second is it is either going to entice to you do something or scare to you do something, meaning they want -- the hackers want you not to think. if you took a breath and you really sat back, you would start thinking this would not be real. for example, no offense, h